CISSP For Dummies

Monitoring covers much wider ground than just periodic or constant inspection of audit logs. Monitoring includes the following activities:

The remainder of this section is dedicated to the discussion of these activities.

Penetration testing

 Instant Answer   Penetration testing is the general term that describes the use of tools to discover and identify security vulnerabilities.

Penetration testing techniques include

Packet sniffing isn’t all bad

Packet sniffing isn’t just a tool used by hackers to pick up userids and passwords from the LAN. Packet sniffing has legitimate uses as well. Primarily, it’s used as a diagnostic tool to troubleshoot a problem, such as a firewall (to see whether the desired packets are getting through), routers, switches, and virtual LANs (VLANs).

The obvious danger of the packet sniffer falling into the wrong hands is the capability to capture userids and passwords. Equally perilous is the fact that packet sniffers are next to impossible to detect on a network.

Intrusion detection and prevention

Intrusion detection is the technique used to detect unauthorized activity on a network. An intrusion detection system is frequently called an IDS. The two types of IDSes used today are

Both network and host-based IDSes use a number of methods:

We are obligated to tell you that intrusion detection doesn’t stop intruders, but intrusion prevention does . . . or at least it slows them down. Intrusion prevention systems are the newer and more common systems that are designed to detect and block intrusions.

 Instant Answer   Intrusion detection is used to detect known attacks and or anomalous behavior on a network or host.

Violation analysis

Violation analysis is the science of examining activity and audit logs to discover inappropriate activities. Violation analysis uses clipping levels, which are the thresholds that differentiate violations from nonevents.

Here’s an example. Users on a particular system sometimes type in their passwords incorrectly, so a few errors are allowed. But wisely, you set a clipping level of four failed login attempts per hour. Whenever a user has fewer than four failed attempts, everything’s cool. But when the clipping level is exceeded, then a violation has occurred. In this example, the violation may indicate that someone is trying to break in to the system by guessing passwords.

Keystroke monitoring

Keystroke monitoring is used to record all input activities on a terminal or workstation. Keystroke monitoring can sap your resources; it can be difficult to hide, and issues exist regarding the privacy rights of the person(s) whose activities are being monitored at this level of scrutiny.

Keystroke monitoring must be used with care - perhaps only as an aid for an active investigation. Only if you want to see yourself on TV (and not for good reasons) should you consider routinely installing keystroke-monitoring software on workstations.

Traffic and trend analysis

Traffic and trend analysis are the techniques used to make inferences about the activities of an individual or an organization based upon the type and volume of traffic on a network. For instance, a dramatic rise in network traffic at 2 a.m. might be an indication of backups or batch processing.

Hackers use traffic and trend analysis too. Read more about this topic in Chapter 7.

Facilities monitoring

No monitoring plan is complete without some physical monitoring capabilities. A few methods are

Responding to events

Okay, so through your foresight and leadership (and the excellent book that you’re reading right now), your organization has full security monitoring capabilities. What do you do when one of the monitoring systems indicates that a security event is unfolding? How will you recognize and respond?

 Instant Answer   The process of detecting, responding, and fixing a problem is known as problem or incident management.

 Cross-Reference   Like business continuity planning and disaster recovery planning (read more about this in Chapter 11), security event recognition requires advance planning:

Security event resolution

How should an organization define resolution of a security event? Is it when the affected systems’ functionality has been restored? Is it when the perpetrator has been identified? Is it after any architecture or process changes designed to prevent a repeat of the event have been put into place? Each organization will need to get its arms around this so that senior management and the security community agree on the term resolution.

Категории